How can agencies spot vetted personnel who plan to steal, corrupt, or leak sensitive information? Technologies — from language parsing tools to personality mapping apps — can spot at-risk employees. But, although these tools can analyze data and look for patterns, humans need to make the call. Combining software strategies with person-to-person interactions can help ensure the safety of your people and your data… before an incident occurs.
Alion counterintelligence expert Dan McGarvey helps uncover the issues and answers surrounding insider threats in this article, “Assessing the Mind of the Malicious Insider,” published by the Intelligence and National Security Alliance (INSA) and reported on by Defense One.